CVE-2022-35971: CWE-617: Reachable Assertion in tensorflow tensorflow
TensorFlow is an open source platform for machine learning. If `FakeQuantWithMinMaxVars` is given `min` or `max` tensors of a nonzero rank, it results in a `CHECK` fail that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 785d67a78a1d533759fcd2f5e8d6ef778de849e0. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
AI Analysis
Technical Summary
CVE-2022-35971 is a medium-severity vulnerability affecting TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The issue arises in the `FakeQuantWithMinMaxVars` operation, which is used for quantization-aware training by simulating the effects of reduced precision arithmetic. Specifically, if the `min` or `max` input tensors provided to this operation have a nonzero rank (i.e., they are not scalar values but tensors with dimensions), it triggers a `CHECK` failure within TensorFlow's internal validation logic. This failure manifests as a reachable assertion (CWE-617), causing the program to abort unexpectedly. The consequence is a denial of service (DoS) condition, where an attacker can cause the TensorFlow process to crash by supplying crafted inputs that violate the expected tensor shape constraints. The vulnerability affects TensorFlow versions prior to 2.7.2, as well as certain patch versions in the 2.8.x and 2.9.x series. The issue has been patched in TensorFlow 2.10.0 and backported to supported versions 2.7.2, 2.8.1, and 2.9.1. There are currently no known workarounds, and no exploits have been observed in the wild. The vulnerability requires an attacker to have the ability to supply or influence input tensors to the `FakeQuantWithMinMaxVars` operation, which typically occurs in environments where untrusted or user-supplied data is processed by TensorFlow models. The attack does not require authentication if the TensorFlow service is exposed to untrusted inputs, but user interaction or input manipulation is necessary to trigger the assertion failure. This vulnerability impacts the availability of TensorFlow-based services by causing unexpected crashes, but it does not directly compromise confidentiality or integrity of data or models.
Potential Impact
For European organizations, the primary impact of CVE-2022-35971 is the potential disruption of machine learning services that rely on vulnerable TensorFlow versions. Organizations deploying TensorFlow in production environments—such as financial institutions using ML for fraud detection, healthcare providers leveraging AI for diagnostics, or manufacturing firms employing predictive maintenance—may experience service outages or degraded availability if an attacker exploits this vulnerability. While the vulnerability does not lead to data leakage or unauthorized code execution, denial of service conditions can interrupt critical workflows, causing operational delays and potential financial losses. Additionally, organizations that expose TensorFlow-based APIs or services to external users or partners are at higher risk, as attackers could supply malicious inputs remotely. The lack of known exploits reduces immediate risk, but the widespread use of TensorFlow in Europe, especially in research institutions and technology companies, means that unpatched systems remain vulnerable. The vulnerability also poses a risk to cloud service providers and managed ML platforms operating in Europe that offer TensorFlow-based services, potentially affecting multiple customers. Given the absence of workarounds, timely patching is essential to maintain service reliability and trust in AI-driven applications.
Mitigation Recommendations
European organizations should prioritize upgrading TensorFlow installations to version 2.10.0 or later, or apply the backported patches available in versions 2.7.2, 2.8.1, and 2.9.1. Since no workarounds exist, patching is the only effective mitigation. Organizations should audit their machine learning pipelines to identify any use of the `FakeQuantWithMinMaxVars` operation, especially where input tensors might originate from untrusted sources. Implement input validation and sanitization at the application level to ensure that `min` and `max` tensors are scalar values before being passed to TensorFlow operations. Restrict access to TensorFlow services by enforcing network segmentation and applying strict access controls to reduce exposure to untrusted users. Monitoring TensorFlow logs for unexpected crashes or assertion failures can help detect attempted exploitation. For cloud deployments, coordinate with service providers to confirm patch status and apply updates promptly. Additionally, organizations should incorporate this vulnerability into their incident response plans and conduct training to raise awareness among ML engineers and DevOps teams about the importance of secure model deployment practices.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Ireland, Belgium, Italy
CVE-2022-35971: CWE-617: Reachable Assertion in tensorflow tensorflow
Description
TensorFlow is an open source platform for machine learning. If `FakeQuantWithMinMaxVars` is given `min` or `max` tensors of a nonzero rank, it results in a `CHECK` fail that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 785d67a78a1d533759fcd2f5e8d6ef778de849e0. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue.
AI-Powered Analysis
Technical Analysis
CVE-2022-35971 is a medium-severity vulnerability affecting TensorFlow, an open-source machine learning platform widely used for developing and deploying machine learning models. The issue arises in the `FakeQuantWithMinMaxVars` operation, which is used for quantization-aware training by simulating the effects of reduced precision arithmetic. Specifically, if the `min` or `max` input tensors provided to this operation have a nonzero rank (i.e., they are not scalar values but tensors with dimensions), it triggers a `CHECK` failure within TensorFlow's internal validation logic. This failure manifests as a reachable assertion (CWE-617), causing the program to abort unexpectedly. The consequence is a denial of service (DoS) condition, where an attacker can cause the TensorFlow process to crash by supplying crafted inputs that violate the expected tensor shape constraints. The vulnerability affects TensorFlow versions prior to 2.7.2, as well as certain patch versions in the 2.8.x and 2.9.x series. The issue has been patched in TensorFlow 2.10.0 and backported to supported versions 2.7.2, 2.8.1, and 2.9.1. There are currently no known workarounds, and no exploits have been observed in the wild. The vulnerability requires an attacker to have the ability to supply or influence input tensors to the `FakeQuantWithMinMaxVars` operation, which typically occurs in environments where untrusted or user-supplied data is processed by TensorFlow models. The attack does not require authentication if the TensorFlow service is exposed to untrusted inputs, but user interaction or input manipulation is necessary to trigger the assertion failure. This vulnerability impacts the availability of TensorFlow-based services by causing unexpected crashes, but it does not directly compromise confidentiality or integrity of data or models.
Potential Impact
For European organizations, the primary impact of CVE-2022-35971 is the potential disruption of machine learning services that rely on vulnerable TensorFlow versions. Organizations deploying TensorFlow in production environments—such as financial institutions using ML for fraud detection, healthcare providers leveraging AI for diagnostics, or manufacturing firms employing predictive maintenance—may experience service outages or degraded availability if an attacker exploits this vulnerability. While the vulnerability does not lead to data leakage or unauthorized code execution, denial of service conditions can interrupt critical workflows, causing operational delays and potential financial losses. Additionally, organizations that expose TensorFlow-based APIs or services to external users or partners are at higher risk, as attackers could supply malicious inputs remotely. The lack of known exploits reduces immediate risk, but the widespread use of TensorFlow in Europe, especially in research institutions and technology companies, means that unpatched systems remain vulnerable. The vulnerability also poses a risk to cloud service providers and managed ML platforms operating in Europe that offer TensorFlow-based services, potentially affecting multiple customers. Given the absence of workarounds, timely patching is essential to maintain service reliability and trust in AI-driven applications.
Mitigation Recommendations
European organizations should prioritize upgrading TensorFlow installations to version 2.10.0 or later, or apply the backported patches available in versions 2.7.2, 2.8.1, and 2.9.1. Since no workarounds exist, patching is the only effective mitigation. Organizations should audit their machine learning pipelines to identify any use of the `FakeQuantWithMinMaxVars` operation, especially where input tensors might originate from untrusted sources. Implement input validation and sanitization at the application level to ensure that `min` and `max` tensors are scalar values before being passed to TensorFlow operations. Restrict access to TensorFlow services by enforcing network segmentation and applying strict access controls to reduce exposure to untrusted users. Monitoring TensorFlow logs for unexpected crashes or assertion failures can help detect attempted exploitation. For cloud deployments, coordinate with service providers to confirm patch status and apply updates promptly. Additionally, organizations should incorporate this vulnerability into their incident response plans and conduct training to raise awareness among ML engineers and DevOps teams about the importance of secure model deployment practices.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-07-15T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9845c4522896dcbf4080
Added to database: 5/21/2025, 9:09:25 AM
Last enriched: 6/22/2025, 8:05:15 PM
Last updated: 8/18/2025, 7:14:46 PM
Views: 11
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.